{"id":9476,"date":"2021-03-26T16:27:07","date_gmt":"2021-03-26T13:27:07","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=9476"},"modified":"2022-05-05T14:26:35","modified_gmt":"2022-05-05T11:26:35","slug":"pandemic-year-in-infosec","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/pandemic-year-in-infosec\/9476\/","title":{"rendered":"B\u00fcy\u00fck Karantina: COVID-19 siber g\u00fcvenli\u011fi nas\u0131l etkiledi?"},"content":{"rendered":"<p>Mart 2020 tarihine gelene kadar, COVID-19 salg\u0131n\u0131 \u00e7oktan 100\u2019den fazla \u00fclkeye yay\u0131lm\u0131\u015f ve <a href=\"https:\/\/www.who.int\/en\/director-general\/speeches\/detail\/who-director-general-s-opening-remarks-at-the-media-briefing-on-covid-19---11-march-2020\" target=\"_blank\" rel=\"noopener nofollow\">resmi bir \u015fekilde bir salg\u0131n olarak tan\u0131mlanm\u0131\u015ft\u0131.<\/a> D\u00fcnya, bir y\u0131ld\u0131r bu benzeri g\u00f6r\u00fclmemi\u015f vir\u00fcsle olan sava\u015f\u0131na devam ediyor. Hastal\u0131\u011f\u0131n yay\u0131lmas\u0131n\u0131n, bireylerin sa\u011fl\u0131\u011f\u0131 ve t\u00fcm \u00fclkelerin ekonomileri \u00fczerindeki bariz etkilerinin yan\u0131 s\u0131ra, milyonlarca insan\u0131n g\u00fcnl\u00fck ya\u015famlar\u0131nda tetikledi\u011fi ani ve k\u00f6kl\u00fc de\u011fi\u015fiklikler de oldu. \u0130\u015f ve e\u011fitim hayat\u0131 evlere ta\u015f\u0131nd\u0131; video konferanslar sosyalle\u015fme ve i\u015f toplant\u0131lar\u0131n\u0131n yerini ald\u0131. B\u00fcy\u00fck \u00f6l\u00e7\u00fcde \u00e7evrimi\u00e7ine ge\u00e7ilmesi ile, siber g\u00fcvenlik konulu endi\u015feler daha da alevlendi.<\/p>\n<h2><strong>Ev ofislerde siber g\u00fcvenlik tehditleri<\/strong><\/h2>\n<p>Muhtemelen i\u015f s\u00fcre\u00e7lerinde ya\u015fanan temel de\u011fi\u015fiklik, mecburen evden \u00e7al\u0131\u015fmaya ge\u00e7i\u015f yap\u0131lmas\u0131yd\u0131. Nisan 2020 tarihinde y\u00fcr\u00fctt\u00fc\u011f\u00fcm\u00fcz <a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/05\/03191550\/6471_COVID-19_WFH_Report_WEB.pdf\">global anketimiz<\/a>, 6.000 kat\u0131l\u0131mc\u0131n\u0131n neredeyse yar\u0131s\u0131n\u0131n daha \u00f6nce hi\u00e7 evden \u00e7al\u0131\u015fmad\u0131\u011f\u0131n\u0131 g\u00f6sterdi. Buna ra\u011fmen, vakalar\u0131n %73\u2019\u00fcnde i\u015fverenler, \u00e7al\u0131\u015fanlar\u0131na kurumsal kaynaklarla internet \u00fczerinden g\u00fcvenli bir \u015fekilde etkile\u015fim kurulmas\u0131 konusunda herhangi bir \u00f6zel e\u011fitim vermedi. Bu t\u00fcr bir e\u011fitim verilmi\u015f olsayd\u0131, insan fakt\u00f6r\u00fcn\u00fcn neden oldu\u011fu vakalar\u0131n say\u0131s\u0131 azalabilirdi. Kurumsal BT\u2019nin cihazlar, yaz\u0131l\u0131mlar ve kullan\u0131c\u0131 faaliyetleri \u00fczerindeki azalan kontrol\u00fc, bu konudaki risklerin artmas\u0131na yol a\u00e7t\u0131.<\/p>\n<h3>Ev ekipmanlar\u0131<\/h3>\n<p>\u015eirketlerin bir\u00e7o\u011fu, \u00e7al\u0131\u015fanlar\u0131na kurumsal ekipman sa\u011flamad\u0131. Bunu yapmak yerine, personellerinin genelde olduk\u00e7a zay\u0131f \u015fekilde korunan ev cihazlar\u0131n\u0131 kullanarak \u00e7al\u0131\u015fmalar\u0131na ve ofis BT altyap\u0131s\u0131na ba\u011flanmalar\u0131na izin verdiler. Anketimiz, kat\u0131l\u0131mc\u0131lar\u0131n %68\u2019inin ki\u015fisel bilgisayarlar\u0131n\u0131 kullanarak evden \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131 ortaya koydu. Sonbaharda bir <a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/03\/16090300\/consumer-appetite-versus-action-report.pdf\">ba\u015fka \u00e7al\u0131\u015fma y\u00fcr\u00fctt\u00fck<\/a> ve \u00e7al\u0131\u015fmam\u0131z\u0131n sonucunda ayn\u0131 \u015fekilde \u00e7al\u0131\u015fan \u00e7ok daha fazla insan oldu\u011funu tespit ettik. Ankete kat\u0131lanlar\u0131n yar\u0131s\u0131ndan fazlas\u0131na (%51) i\u015fverenleri taraf\u0131ndan gerekli ekipman sa\u011flanm\u0131\u015f olmas\u0131na ra\u011fmen, kat\u0131l\u0131mc\u0131lar\u0131n yakla\u015f\u0131k %80\u2019inin i\u015f i\u00e7in ev bilgisayarlar\u0131n\u0131 kulland\u0131\u011f\u0131 g\u00f6r\u00fcld\u00fc.<\/p>\n<p>Uzaktan \u00e7al\u0131\u015fan bu ki\u015filer, ki\u015fisel cihazlar\u0131n\u0131 ayr\u0131ca e\u011flence, \u00e7evrimi\u00e7i oyun oynamak (%31) ve film izlemek (%34) i\u00e7in de kulland\u0131. Bununla birlikte, bir\u00e7ok ki\u015fi \u015firket diz\u00fcst\u00fc bilgisayarlar\u0131n\u0131 ve ak\u0131ll\u0131 telefonlar\u0131n\u0131 istenmeyen ama\u00e7lar i\u00e7in de kulland\u0131. \u00d6rne\u011fin, ankete kat\u0131lanlar\u0131n %18\u2019i, bu cihazlar\u0131 yeti\u015fkinlere uygun i\u00e7erikleri g\u00f6r\u00fcnt\u00fclemek i\u00e7in kulland\u0131\u011f\u0131n\u0131 belirtti. Siber su\u00e7lular, kullan\u0131c\u0131lar\u0131 sahte sitelere \u00e7ekmeye ve bir film veya kurulum dosyas\u0131 gibi g\u00f6r\u00fcnen k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 kullan\u0131c\u0131lar\u0131n indirmelerini sa\u011flamaya \u00e7al\u0131\u015farak \u00e7evrimi\u00e7i e\u011flence alan\u0131ndaki artan ilgiden <a href=\"https:\/\/securelist.com\/do-cybercriminals-play-cyber-games-during-quarantine\/97241\/\" target=\"_blank\" rel=\"noopener\">etkin bir \u015fekilde faydaland\u0131lar<\/a>. Sonbaharda ger\u00e7ekle\u015ftirdi\u011fimiz anketimize kat\u0131lan kullan\u0131c\u0131lar\u0131n toplamda %61\u2019i torrent sitelerinden yaz\u0131l\u0131m indirdiklerini itiraf etti; %65\u2019i bu t\u00fcr siteleri m\u00fczik i\u00e7in, %66\u2019s\u0131 ise filmler i\u00e7in kulland\u0131\u011f\u0131n\u0131 belirtti. Uzaktan \u00f6l\u00e7\u00fcm verilerimiz, 2020 bahar\u0131ndaki en pop\u00fcler hedeflerin <em>Minecraft<\/em> ile televizyon dizisi olan <em>Stranger Things<\/em> oldu\u011funu belirledi.<\/p>\n<h3><strong>Uzaktan \u00e7al\u0131\u015fma i\u00e7in g\u00fcvenli olmayan kanallar<\/strong><\/h3>\n<p>Ofislerde, BT y\u00f6neticileri internet kanal\u0131n\u0131n g\u00fcvenli\u011fini sa\u011flamakla ilgilenir. Ancak \u00e7al\u0131\u015fanlar evden \u00e7al\u0131\u015ft\u0131klar\u0131 zaman, kendi y\u00f6nlendiricilerini ve a\u011flar\u0131n\u0131 kuruyorlar; ve bu uygulama ile g\u00fcvenlik risklerini art\u0131r\u0131yorlar.<\/p>\n<p>Tam da bu nedenle, Mart-Nisan 2020 tarihleri aras\u0131nda, g\u00fcvenli olmayan RDP ba\u011flant\u0131 noktalar\u0131na \u2014 Windows i\u015fletim sistemi ile \u00e7al\u0131\u015fan bilgisayarlardaki en pop\u00fcler uzaktan ba\u011flant\u0131 protokol\u00fc \u2014 y\u00f6nelik sald\u0131r\u0131lar\u0131n say\u0131s\u0131 <a href=\"https:\/\/securelist.com\/remote-spring-the-rise-of-rdp-bruteforce-attacks\/96820\/\" target=\"_blank\" rel=\"noopener\">Rusya\u2019da on kat, Amerika Birle\u015fik Devletleri\u2019nde ise yedi kat artt\u0131.<\/a><\/p>\n<h3><strong>\u0130\u015fbirli\u011fi ara\u00e7lar\u0131ndaki g\u00fcvenlik a\u00e7\u0131klar\u0131<\/strong><\/h3>\n<p>\u00c7al\u0131\u015fanlar ofisteyken belgeleri d\u00fczenleyebilir ve toplant\u0131lara \u015fahsen kat\u0131labilirdi. Uzaktan \u00e7al\u0131\u015fma d\u00fcnyas\u0131nda, video konferans yaz\u0131l\u0131m\u0131 ve i\u015fbirli\u011fi ara\u00e7lar\u0131na olan talep \u00f6nemli \u00f6l\u00e7\u00fcde artt\u0131. Talepteki bu art\u0131\u015f, siber su\u00e7lular\u0131n <a href=\"https:\/\/securelist.com\/the-story-of-the-year-remote-work\/99720\/\" target=\"_blank\" rel=\"noopener\">ilgisini \u00e7eken<\/a> \u015feylerden biri oldu.<\/p>\n<p>Ancak me\u015fru video konferans yaz\u0131l\u0131mlar\u0131nda da g\u00fcvenlik a\u00e7\u0131klar\u0131 oldu\u011fu <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/videoconference-software-security\/8182\/\" target=\"_blank\" rel=\"noopener\">ke\u015ffedildi<\/a>. \u00d6rne\u011fin, bir y\u0131l \u00f6nce, Microsoft Teams kurumsal mesajla\u015fma hizmetinde yer alan ve bir sald\u0131rgan\u0131n bir kurulu\u015ftaki t\u00fcm hesaplara eri\u015fmesini sa\u011flayan bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 tespit edildi ve ortadan kald\u0131r\u0131ld\u0131. Ayn\u0131 zamanlarda, Zoom for macOS geli\u015ftiricileri, yabanc\u0131lar\u0131n bir kullan\u0131c\u0131n\u0131n cihaz\u0131n\u0131n kontrol\u00fcn\u00fc ele ge\u00e7irmesine izin veren hatalar\u0131 d\u00fczeltti.<\/p>\n<p>\u00c7al\u0131\u015fanlar, belgeler \u00fczerinde i\u015fbirli\u011fi yapmak ve dosya al\u0131\u015fveri\u015finde bulunmak i\u00e7in genellikle Google Dok\u00fcmanlar gibi \u00fccretsiz hizmetlerdeki ki\u015fisel hesaplar\u0131n\u0131 kulland\u0131lar. Ancak bu hizmetlerde genellikle gizli verilerin korunmas\u0131n\u0131 sa\u011flayacak <a href=\"https:\/\/workspace.google.com\/intl\/en\/products\/vault\/\" target=\"_blank\" rel=\"noopener nofollow\">merkezi haklar y\u00f6netimi<\/a> bulunmuyor.<\/p>\n<p><strong><input type=\"hidden\" class=\"category_for_banner\" value=\"ksc\"><\/strong><\/p>\n<h2><strong>Sald\u0131rganlar\u0131n g\u00f6r\u00fc\u015f alan\u0131ndaki sa\u011fl\u0131k sekt\u00f6r\u00fc<br>\n<\/strong><\/h2>\n<p>Siber su\u00e7lular, salg\u0131n s\u0131ras\u0131nda devasa bir y\u00fck\u00fcn alt\u0131nda ezilen sa\u011fl\u0131k sekt\u00f6r\u00fcndeki kurumlara, hastanelere ve hatta doktorlara do\u011frudan sald\u0131rmaya \u00e7al\u0131\u015ft\u0131.<\/p>\n<p>\u00d6rne\u011fin, Mart 2020\u2019de ABD Sa\u011fl\u0131k ve \u0130nsan Hizmetleri Bakanl\u0131\u011f\u0131\u2019n\u0131n (HHS) sunucular\u0131 <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2020-03-16\/u-s-health-agency-suffers-cyber-attack-during-covid-19-response\" target=\"_blank\" rel=\"noopener nofollow\">b\u00fcy\u00fck bir DDoS sald\u0131r\u0131s\u0131na u\u011frad\u0131<\/a>. Ayn\u0131 ay i\u00e7erisinde, \u00c7ekya\u2019n\u0131n en b\u00fcy\u00fck COVID-19 kan testi merkezlerinden biri olan Brno\u2019daki \u00dcniversite Hastanesine ait veri tabanlar\u0131 da <a href=\"https:\/\/ct24.ceskatelevize.cz\/domaci\/3061748-fakultni-nemocnice-v-brne-celi-kybernetickemu-utoku-pise-idnescz\" target=\"_blank\" rel=\"noopener nofollow\">bir siber sald\u0131r\u0131dan<\/a> etkilendi. Bu sald\u0131r\u0131n\u0131n sonucunda, doktorlar koronavir\u00fcs testlerini i\u015fleyemedi, \u00fcstelik bir dizi cerrahi operasyonu da iptal etti.<\/p>\n<p>\u0130leri d\u00fczeydeki siber su\u00e7lular ise COVID-19 ile m\u00fccadele eden kurulu\u015flar\u0131 hedef ald\u0131. Lazarus Grubu \u00fcyelerinin, Eyl\u00fcl 2020\u2019de koronavir\u00fcs a\u015f\u0131s\u0131 geli\u015ftiren bir ila\u00e7 \u015firketine sald\u0131rd\u0131\u011f\u0131na dair <a href=\"https:\/\/securelist.com\/lazarus-covets-covid-19-related-intelligence\/99906\/\" target=\"_blank\" rel=\"noopener\">kan\u0131tlar<\/a> bulunuyor; s\u00f6z konusu olaydan bir ay sonra ise rotalar\u0131n\u0131 benzer bir sa\u011fl\u0131k hizmetine \u00e7evirdiler.<\/p>\n<p>Bu sald\u0131r\u0131n\u0131n hedefinde ise hem sa\u011fl\u0131k kurulu\u015flar\u0131 hem de bireysel \u00e7al\u0131\u015fanlar vard\u0131. \u0130ngiltere\u2019deki doland\u0131r\u0131c\u0131lar ise \u201c\u00f6l\u00fcmc\u00fcl COVID-19 vir\u00fcs\u00fc\u201d hakk\u0131ndaki s\u00f6zde bir seminere kay\u0131t olmalar\u0131n\u0131 teklif ederek e-posta oturum a\u00e7ma bilgilerini ve parolalar\u0131n\u0131 \u00e7alma amac\u0131yla sa\u011fl\u0131k \u00e7al\u0131\u015fanlar\u0131n\u0131n <a href=\"https:\/\/news.sky.com\/story\/coronavirus-cybercriminals-target-healthcare-workers-with-email-scam-11956617\" target=\"_blank\" rel=\"noopener nofollow\">kand\u0131rd\u0131<\/a>.<\/p>\n<p>Sa\u011fl\u0131k sekt\u00f6r\u00fc sisteminin \u00e7al\u0131\u015fmalar\u0131, tehdidi tahminen anlam\u0131\u015f olmas\u0131 \u00f6ng\u00f6r\u00fclen ki\u015filer taraf\u0131ndan da aksat\u0131ld\u0131: bu ki\u015filer, sa\u011fl\u0131k sekt\u00f6r\u00fcndeki \u015firket \u00e7al\u0131\u015fanlar\u0131n\u0131n ta kendisi. \u00d6rne\u011fin, ge\u00e7ti\u011fimiz y\u0131l\u0131n bahar\u0131nda, Amerikan bir \u015firket olan Stradis Healthcare\u2019deki ba\u015fkan yard\u0131mc\u0131l\u0131\u011f\u0131 g\u00f6revinden ihra\u00e7 edilen bir adam, <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/fired-insider\/9235\/\" target=\"_blank\" rel=\"noopener\">i\u015ften \u00e7\u0131kar\u0131lmas\u0131n\u0131n intikam\u0131 olarak doktorlara y\u00f6nelik ki\u015fisel koruyucu ekipman tedarik edilmesini birka\u00e7 ay boyunca aksamas\u0131na neden oldu.<\/a> <a href=\"https:\/\/threatpost.com\/healthcare-exec-stalls-critical-ppe-shipment\/162855\/\" target=\"_blank\" rel=\"noopener nofollow\">FBI\u2019dan al\u0131nan bilgiye<\/a> g\u00f6re, bu ki\u015fi, eski meslekta\u015flar\u0131n\u0131n \u00e7al\u0131\u015fmalar\u0131n\u0131 sahip oldu\u011fu gizli bir hesab\u0131 kullanarak sabote etti. Ocak 2021\u2019de, bu ki\u015finin bir y\u0131l hapis cezas\u0131na \u00e7arpt\u0131r\u0131ld\u0131\u011f\u0131 bildirildi.<\/p>\n<h2>COVID temal\u0131 kimlik avlar\u0131<\/h2>\n<p>Bir yandan d\u00fcnyan\u0131n d\u00f6rt bir yan\u0131ndaki h\u00fck\u00fcmetler COVID-19 ile m\u00fccadele edip i\u015fletmeleri ve vatanda\u015flar\u0131 desteklemek ad\u0131na \u00f6nlemler geli\u015ftirirken, di\u011fer yandan siber su\u00e7lular vir\u00fcs\u00fcn yaratt\u0131\u011f\u0131 korkudan ve insanlar\u0131n yard\u0131m ihtiyac\u0131ndan faydalanmaya \u00e7al\u0131\u015ft\u0131. Anketimiz, kullan\u0131c\u0131lar\u0131n d\u00f6rtte birinin COVID-19 ile ilgili konular hakk\u0131nda k\u00f6t\u00fc niyetli e-postalar ald\u0131\u011f\u0131n\u0131 ortaya koydu.<\/p>\n<h3><strong>M\u00fc\u015fterilerden ve devlet dairelerinden gelen sahte yaz\u0131\u015fmalar<\/strong><\/h3>\n<p>\u00d6rne\u011fin, doland\u0131r\u0131c\u0131lar <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/coronavirus-phishing\/7649\/\" target=\"_blank\" rel=\"noopener\">ABD Hastal\u0131k Kontrol ve \u00d6nleme Merkezi (CDC) gibi davranarak sahte e-postalar g\u00f6nderdiler<\/a>. G\u00f6nderilen bu e-postalarda kurbanlardan kom\u015fular\u0131 aras\u0131nda yak\u0131n zamanda ortaya \u00e7\u0131kan koronavir\u00fcs vakalar\u0131n\u0131n bir \u00f6zet doldurarak bildirmeleri istendi; ve bu \u00f6zeti doldurmalar\u0131 i\u00e7in, bir ba\u011flant\u0131ya t\u0131klamalar\u0131, e-posta giri\u015f bilgilerini ve parolalar\u0131n\u0131 girmeleri gerekiyordu. Bu sayede hesap bilgileri su\u00e7lular\u0131n eline ge\u00e7ti.<\/p>\n<p>Karantina dalgas\u0131 s\u0131ras\u0131nda artan \u015feylerden bir di\u011feri ise <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/coronavirus-corporate-phishing-2\/8019\/\" target=\"_blank\" rel=\"noopener\">\u00fcr\u00fcn nakliyesi hakk\u0131ndaki m\u00fc\u015fteri talepleri ad\u0131 alt\u0131nda gizlenen e-postalar\u0131n say\u0131s\u0131<\/a> oldu. Sald\u0131rganlar g\u00fcvenilirlik sa\u011flamak amac\u0131yla \u201cCOVID-19 kaynakl\u0131 lojistik sorunlar\u0131\u201dndan \u015fikayet ettiler veya kar\u015f\u0131 taraflar\u0131 olan \u00c7inlilerle ilgili ya\u015fad\u0131klar\u0131 sorunlar\u0131 gerek\u00e7e g\u00f6stererek h\u0131zland\u0131r\u0131lm\u0131\u015f teslimat talep ettiler. Bu mesajlar\u0131n i\u00e7erisinde genellikle, su\u00e7lular\u0131n vir\u00fcs bula\u015fan cihaz\u0131 uzaktan kontrol etmelerini sa\u011flayan bir Truva at\u0131 veya arka kap\u0131 i\u00e7eren bir ek yer al\u0131yordu.<\/p>\n<p><strong><input type=\"hidden\" class=\"category_for_banner\" value=\"kis-top3\"><\/strong><\/p>\n<h3>Sahte COVID-19 \u00f6demeleri<\/h3>\n<p>Verilerimize g\u00f6re doland\u0131r\u0131c\u0131lar, 2020 y\u0131l\u0131nda ge\u00e7en y\u0131la g\u00f6re sosyal yard\u0131mlarla ilgili <a href=\"https:\/\/securelist.com\/the-story-of-the-year-remote-work\/99720\/\" target=\"_blank\" rel=\"noopener\">be\u015f kat daha fazla<\/a> k\u00f6t\u00fc niyetli e-posta g\u00f6nderdiler. Bu mesajlar\u0131n yine devlet dairelerinden, Uluslararas\u0131 Para Fonu\u2019ndan ve hatta <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/covid-compensation-spam\/8414\/\" target=\"_blank\" rel=\"noopener\">D\u00fcnya Sa\u011fl\u0131k \u00d6rg\u00fct\u00fc\u2019nden<\/a> geldi\u011fi iddia ettiler.<\/p>\n<p>Klasik senaryo bu defa yeni bir \u015fekilde sunuldu: Kurbana \u00f6nce tazminat s\u00f6z\u00fc verdiler, ard\u0131ndan ise s\u00f6z konusu fonlar\u0131 ma\u011fdura aktarmak i\u00e7in ondan d\u00fc\u015f\u00fck tutarda bir komisyon talep ettiler.<\/p>\n<p>Siber su\u00e7lular, Facebook\u2019un k\u00fc\u00e7\u00fck i\u015fletmelere ba\u011f\u0131\u015f yapmas\u0131 ile ilgili yap\u0131lan ger\u00e7ek haberlerden de yararland\u0131. Habere al\u0131nt\u0131lay\u0131p pop\u00fcler sosyal medya platformunun <a href=\"https:\/\/www.kaspersky.com\/blog\/facebook-grants\/37181\/\" target=\"_blank\" rel=\"noopener nofollow\">t\u00fcm kullan\u0131c\u0131lar\u0131na s\u00f6z konusu ba\u011f\u0131\u015f\u0131n yap\u0131laca\u011f\u0131n\u0131 duyurdular<\/a>. Kurbanlardan Facebook kullan\u0131c\u0131 ad\u0131 ve parolalar\u0131n\u0131, adreslerini, Sosyal G\u00fcvenlik numaralar\u0131n\u0131 ve kimlik belgelerinin bir foto\u011fraf\u0131n\u0131 sa\u011flayarak ba\u015fvuruda bulunmalar\u0131 istendi. T\u00fcm bu veriler karaborsada olduk\u00e7a pahal\u0131 bir fiyata sahip.<\/p>\n<h2><strong>Kendinizi nas\u0131l koruyabilirsiniz?<\/strong><\/h2>\n<p>Siber su\u00e7lular, ge\u00e7irdi\u011fimiz salg\u0131n y\u0131l\u0131 boyunca asl\u0131nda yeni bir sald\u0131r\u0131 plan\u0131 icat etmediler, bunun yerine COVID-19 temas\u0131ndan aktif olarak faydaland\u0131lar. Ayr\u0131ca, bir\u00e7ok ki\u015finin i\u015f nedeniyle \u00e7evrimi\u00e7i ortama ge\u00e7mesiyle birlikte \u00e7evrimi\u00e7i sald\u0131r\u0131lar\u0131n say\u0131s\u0131 da do\u011fal olarak y\u00fckseldi.<\/p>\n<p>Kurbanlardan biri olmaman\u0131z i\u00e7in, sizlere <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/tag\/uzaktan-calisma\/\" target=\"_blank\" rel=\"noopener\">\u201cEvden \u00e7al\u0131\u015f\u0131rken kendinizi nas\u0131l koruyabilirsiniz?\u201d<\/a> konulu makalelerimizi okuman\u0131z\u0131 \u00f6neririz. Son olarak, gelin sizlere evrensel olarak ge\u00e7erli olan birka\u00e7 ipucu verelim:<\/p>\n<ul>\n<li>G\u00f6nderene g\u00fcvenip g\u00fcvenemeyece\u011finiz konusunda emin de\u011filseniz, yabanc\u0131lardan gelen ba\u011flant\u0131lara t\u0131klamay\u0131n veya e-postalarda yer alan dosyalar\u0131 indirmeyin;<\/li>\n<li>\u0130\u015f i\u00e7in kurumsal cihazlar\u0131 ve \u015firket taraf\u0131ndan onaylanm\u0131\u015f yaz\u0131l\u0131mlar\u0131 kullan\u0131n; programlar\u0131 ve cihazlar\u0131 do\u011fru \u015fekilde yap\u0131land\u0131r\u0131n;<\/li>\n<li>\u0130\u015fvereninizden \u015firket cihazlar\u0131na\u00a0<a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">g\u00fcvenilir bir koruma<\/a> kurmas\u0131n\u0131 talep edin; siz de\u00a0<strong><a href=\"https:\/\/www.kaspersky.com.tr\/advert\/security-cloud?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____ksc___\" target=\"_blank\" rel=\"noopener\">ki\u015fisel bilgisayar\u0131n\u0131z\u0131 ve ak\u0131ll\u0131 telefonunuzun g\u00fcvenli\u011fini<\/a> <\/strong>g\u00fc\u00e7lendirin.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc\">\n","protected":false},"excerpt":{"rendered":"<p>Karantinalar\u0131n ba\u015flamas\u0131n\u0131n \u00fczerinden bir y\u0131l ge\u00e7ti. Salg\u0131n\u0131 ve sonu\u00e7lar\u0131n\u0131 BT tehditleri prizmas\u0131ndan de\u011ferlendiriyoruz.<\/p>\n","protected":false},"author":2706,"featured_media":9477,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1287,1351],"tags":[1074,2112,2391,537,2145],"class_list":{"0":"post-9476","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-kimlik-avi","10":"tag-koronavirus","11":"tag-saglik-sektoru","12":"tag-tehditler","13":"tag-uzaktan-calisma"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/pandemic-year-in-infosec\/9476\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/pandemic-year-in-infosec\/22654\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/pandemic-year-in-infosec\/18147\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/pandemic-year-in-infosec\/24451\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/pandemic-year-in-infosec\/22475\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/pandemic-year-in-infosec\/21496\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/pandemic-year-in-infosec\/24961\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/pandemic-year-in-infosec\/24237\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/pandemic-year-in-infosec\/30316\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/pandemic-year-in-infosec\/39123\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/pandemic-year-in-infosec\/16622\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/pandemic-year-in-infosec\/17221\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/pandemic-year-in-infosec\/14632\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/pandemic-year-in-infosec\/26440\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/pandemic-year-in-infosec\/30292\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/pandemic-year-in-infosec\/26841\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/pandemic-year-in-infosec\/23702\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/pandemic-year-in-infosec\/29038\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/pandemic-year-in-infosec\/28839\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/koronavirus\/","name":"koronavir\u00fcs"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9476","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=9476"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9476\/revisions"}],"predecessor-version":[{"id":9478,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9476\/revisions\/9478"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/9477"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=9476"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=9476"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=9476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}